Articles by Cert-IST

Cert-IST writes articles in which it analyzes the IT security news. These articles are first published in the monthly bulletin sent to its members. A couple of months later some of these articles are made public in this section of the website.

9 article(s) - 2012

Twenty critical security controls for effective cyber-defense
Fighting rootkits on Windows 64-bit platforms
Report for the SSTIC 2012 conference (Part 2)
Report for the SSTIC 2012 conference (Part 1)
A Trojan uses Sendspace to store stolen documents
Adobe Reader X: is the sandbox feature effective?
JSSI 2012 conference overview
RSA recommendations about APT attacks
Cyber-attack: the Stratfor case
Previous Previous Next Next Print Print